As long as computers and hence the Internet exists, the risk of your email being hacked will always be there. Even when all the…
Latest posts - Page 24
Software or Hardware-based VPN Solution?
We always considered software-based VPN while dealing with private network solutions. This is due to the fact that the typical readership that we have…
Top 9 “Obvious” Ways To Save Your Online Identity
What I am going bring forward isn’t anything new but it surely is a quick reminder in between all the leaks and hacks that…
How Does Tracking an iPhone Work?
I know, this blog is about hiding ourselves from trackers. But in order to be able to do so, it’s also interesting to jump…
Techniques Hackers Use to Infiltrate Systems
Recent media attention has once again reminded us that hackers are still around despite the high-security systems that are in existence. While recent hackers…
SSL VPN for Mobility Enablement
The boom in mobile technology with remote access of network isn’t hidden from anyone. The world is moving faster than we can imagine. From…
Internet Privacy Task Forces
In an effort to curtail ongoing issues with data breaches and Internet privacy, Attorney General George Jepsen has created and implemented the Internet Privacy…
Facebook Privacy Settings: Are They Doing Enough to Protect Your Data?
Facebook privacy settings have always been seen as untrustworthy for users. In order to address this issue, Facebook has introduced a lot of changes…
The IPCONFIG Tool
Have you at one time ever wanted to get the IP address of the computer you are working on without having to navigate through…
The Great Firewall of China
After my boring stint with VPN Protocols, I had to opt for something that is important for all. What else could be a better…
Why Should You Use Https?
If you ever used some popular online platforms (Gmail, facebook, twitter, …), at some point in time they should have asked you if you…
PS3 Proxy Server Configuration
Did you know that Sony can track your location using your PS3 console while connected to the Internet? What can you do to counter…
Connecting Over a Public Wi-Fi: Consider Using a VPN
We nowadays take for granted using a public Wi-fi to browse the internet, check our e-mails or do other private-related internet transactions. Most of…
Make The Internet a Safer Place With AbuseIPDB.com
AbuseIPDB – The AbuseIPDB.com project is the place where you can report IP addresses that are involved in a malicious activity or check whether…
What VPN Solution for My Smartphone?
From the previous articles, we always considered that, as a user, you connect through a VPN connection via a computer, whether it runs Linux,…